2 * security/tomoyo/memory.c
4 * Copyright (C) 2005-2011 NTT DATA CORPORATION
7 #include <linux/hash.h>
8 #include <linux/slab.h>
12 * tomoyo_warn_oom - Print out of memory warning message.
14 * @function: Function's name.
16 void tomoyo_warn_oom(const char *function
)
18 /* Reduce error messages. */
19 static pid_t tomoyo_last_pid
;
20 const pid_t pid
= current
->pid
;
21 if (tomoyo_last_pid
!= pid
) {
22 printk(KERN_WARNING
"ERROR: Out of memory at %s.\n",
24 tomoyo_last_pid
= pid
;
26 if (!tomoyo_policy_loaded
)
27 panic("MAC Initialization failed.\n");
30 /* Lock for protecting tomoyo_memory_used. */
31 static DEFINE_SPINLOCK(tomoyo_policy_memory_lock
);
32 /* Memoy currently used by policy/audit log/query. */
33 unsigned int tomoyo_memory_used
[TOMOYO_MAX_MEMORY_STAT
];
34 /* Memory quota for "policy"/"audit log"/"query". */
35 unsigned int tomoyo_memory_quota
[TOMOYO_MAX_MEMORY_STAT
];
38 * tomoyo_memory_ok - Check memory quota.
40 * @ptr: Pointer to allocated memory.
42 * Returns true on success, false otherwise.
44 * Returns true if @ptr is not NULL and quota not exceeded, false otherwise.
46 bool tomoyo_memory_ok(void *ptr
)
49 const size_t s
= ksize(ptr
);
51 spin_lock(&tomoyo_policy_memory_lock
);
52 tomoyo_memory_used
[TOMOYO_MEMORY_POLICY
] += s
;
53 result
= !tomoyo_memory_quota
[TOMOYO_MEMORY_POLICY
] ||
54 tomoyo_memory_used
[TOMOYO_MEMORY_POLICY
] <=
55 tomoyo_memory_quota
[TOMOYO_MEMORY_POLICY
];
57 tomoyo_memory_used
[TOMOYO_MEMORY_POLICY
] -= s
;
58 spin_unlock(&tomoyo_policy_memory_lock
);
62 tomoyo_warn_oom(__func__
);
67 * tomoyo_commit_ok - Check memory quota.
69 * @data: Data to copy from.
70 * @size: Size in byte.
72 * Returns pointer to allocated memory on success, NULL otherwise.
73 * @data is zero-cleared on success.
75 void *tomoyo_commit_ok(void *data
, const unsigned int size
)
77 void *ptr
= kzalloc(size
, GFP_NOFS
);
78 if (tomoyo_memory_ok(ptr
)) {
79 memmove(ptr
, data
, size
);
80 memset(data
, 0, size
);
88 * tomoyo_memory_free - Free memory for elements.
90 * @ptr: Pointer to allocated memory.
92 void tomoyo_memory_free(void *ptr
)
94 size_t s
= ksize(ptr
);
95 spin_lock(&tomoyo_policy_memory_lock
);
96 tomoyo_memory_used
[TOMOYO_MEMORY_POLICY
] -= s
;
97 spin_unlock(&tomoyo_policy_memory_lock
);
102 * tomoyo_get_group - Allocate memory for "struct tomoyo_path_group"/"struct tomoyo_number_group".
104 * @param: Pointer to "struct tomoyo_acl_param".
105 * @idx: Index number.
107 * Returns pointer to "struct tomoyo_group" on success, NULL otherwise.
109 struct tomoyo_group
*tomoyo_get_group(struct tomoyo_acl_param
*param
,
112 struct tomoyo_group e
= { };
113 struct tomoyo_group
*group
= NULL
;
114 struct list_head
*list
;
115 const char *group_name
= tomoyo_read_token(param
);
117 if (!tomoyo_correct_word(group_name
) || idx
>= TOMOYO_MAX_GROUP
)
119 e
.group_name
= tomoyo_get_name(group_name
);
122 if (mutex_lock_interruptible(&tomoyo_policy_lock
))
124 list
= ¶m
->ns
->group_list
[idx
];
125 list_for_each_entry(group
, list
, head
.list
) {
126 if (e
.group_name
!= group
->group_name
)
128 atomic_inc(&group
->head
.users
);
133 struct tomoyo_group
*entry
= tomoyo_commit_ok(&e
, sizeof(e
));
135 INIT_LIST_HEAD(&entry
->member_list
);
136 atomic_set(&entry
->head
.users
, 1);
137 list_add_tail_rcu(&entry
->head
.list
, list
);
142 mutex_unlock(&tomoyo_policy_lock
);
144 tomoyo_put_name(e
.group_name
);
145 return found
? group
: NULL
;
149 * tomoyo_name_list is used for holding string data used by TOMOYO.
150 * Since same string data is likely used for multiple times (e.g.
151 * "/lib/libc-2.5.so"), TOMOYO shares string data in the form of
152 * "const struct tomoyo_path_info *".
154 struct list_head tomoyo_name_list
[TOMOYO_MAX_HASH
];
157 * tomoyo_get_name - Allocate permanent memory for string data.
159 * @name: The string to store into the permernent memory.
161 * Returns pointer to "struct tomoyo_path_info" on success, NULL otherwise.
163 const struct tomoyo_path_info
*tomoyo_get_name(const char *name
)
165 struct tomoyo_name
*ptr
;
168 struct list_head
*head
;
172 len
= strlen(name
) + 1;
173 hash
= full_name_hash((const unsigned char *) name
, len
- 1);
174 head
= &tomoyo_name_list
[hash_long(hash
, TOMOYO_HASH_BITS
)];
175 if (mutex_lock_interruptible(&tomoyo_policy_lock
))
177 list_for_each_entry(ptr
, head
, head
.list
) {
178 if (hash
!= ptr
->entry
.hash
|| strcmp(name
, ptr
->entry
.name
))
180 atomic_inc(&ptr
->head
.users
);
183 ptr
= kzalloc(sizeof(*ptr
) + len
, GFP_NOFS
);
184 if (tomoyo_memory_ok(ptr
)) {
185 ptr
->entry
.name
= ((char *) ptr
) + sizeof(*ptr
);
186 memmove((char *) ptr
->entry
.name
, name
, len
);
187 atomic_set(&ptr
->head
.users
, 1);
188 tomoyo_fill_path_info(&ptr
->entry
);
189 list_add_tail(&ptr
->head
.list
, head
);
195 mutex_unlock(&tomoyo_policy_lock
);
196 return ptr
? &ptr
->entry
: NULL
;
199 /* Initial namespace.*/
200 struct tomoyo_policy_namespace tomoyo_kernel_namespace
;
203 * tomoyo_mm_init - Initialize mm related code.
205 void __init
tomoyo_mm_init(void)
208 for (idx
= 0; idx
< TOMOYO_MAX_HASH
; idx
++)
209 INIT_LIST_HEAD(&tomoyo_name_list
[idx
]);
210 tomoyo_kernel_namespace
.name
= "<kernel>";
211 tomoyo_init_policy_namespace(&tomoyo_kernel_namespace
);
212 tomoyo_kernel_domain
.ns
= &tomoyo_kernel_namespace
;
213 INIT_LIST_HEAD(&tomoyo_kernel_domain
.acl_info_list
);
214 tomoyo_kernel_domain
.domainname
= tomoyo_get_name("<kernel>");
215 list_add_tail_rcu(&tomoyo_kernel_domain
.list
, &tomoyo_domain_list
);